TechGenix Patch Central: January non-Microsoft patches

The new roaring ’20s are upon us, and experts predict that the coming decade will see an evolution in the tactics and techniques of cybercriminals that is sure to present new challenges to IT admin and security personnel. Ransomware, already a major problem, is expected to continue rising to crisis levels with “malware as a service” making attackers’ nefarious tasks easier than ever. Managed service providers (MSPs) are pegged as a favorite target of cyberattackers. CISO Magazine reports that “deepfake technology” is sure to improve, ransomware attacks will likely become more targeted and morph into two-stage extortion campaigns, and API-enabled apps will be recognized as the weak link that allows attackers to access sensitive data. As if these warnings on the digital front weren’t enough, the first month of this new year turned the world’s focus to a threat of a different kind: the new coronavirus that has spread from China to countries throughout the world. Some cybercriminals saw the epidemic as an opportunity to use fear of the biological virus to persuade people to open malware-laden email attachments that distribute the Emotet Trojan. It will be more important than ever this year to remain vigilant, and that means applying security patches as quickly as possible after release. Software vendors have stayed busy producing updates to protect against the security holes in their products. Let’s take a look at some of the patches issued in January for non-Microsoft products.

Apple

January non-Microsoft patches
Shutterstock

Apple released eight product patches in December, but they did that two better in January, with a total of 10 updates released. The first, released Jan. 8 for iCloud for Windows, did not address any published CVEs. The rest were all released end the end of the month, on Jan. 28 and 29, and include the following:

  • iTunes 12.10.4 for Windows 7 and later. This update addresses eight vulnerabilities in the ImageIO, libxml2, Mobile Device Service, WebKit, and WebKit Page Loading components. The vulnerabilities include multiple memory corruption issues that could lead to arbitrary code execution, a denial of service issue, a buffer overflow vulnerability, an out-of-bounds read issue, and a problem with permissions logic that could allow access to protected parts of the file system.
  • tvOS 13.3.1 for Apple TV 4K and Apple TV HD. This update addresses many of the same vulnerabilities patched in iTunes, plus an arbitrary code execution issue in wifivelocityd, five kernel vulnerabilities that include arbitrary code execution and reading of restricted memory. Also patched are vulnerabilities in Audio, IOAcceleratorFamily, and IPSec.
  • Safari 13.0.5 running on macOS Mojave and macOS High Sierra, and included in macOS Catalina. This update for Apple’s web browser addresses seven vulnerabilities, most of them in WebKit, and they include arbitrary code execution, cross-site scripting, address bar spoofing, and sending of unencrypted passwords across the network.
  • iOS 12.4.5 for iPhone 5s, iPhone 6, iPhone 6 Plus, iPad Air, iPad mini 2, iPad mini 3, and iPod touch 6th generation. This update has no published CVE entries.
  • iOS 13.3.1 and iPadOS 13.3.1 for iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch 7th generation. This update addresses a total of thirty vulnerabilities, including some of those described above as well as issues with the Screenshots, Phone, Safari Login AutoFill, FaceTime, Messages, and Mail components. The most serious of these are arbitrary code execution issues.
  • iCloud for Windows 7.17 for Windows 7 and later. This update addresses seven updates, all of which have been described above, in the ImageIO, libxml2, WebKit, and WebKit Page Loading components. Arbitrary code execution issues are the most serious.
  • watchOS 6.1.2 for Apple Watch Series 1 and later. This update addresses many of the same vulnerabilities described above, as well as an arbitrary code execution/unexpected application termination issue in AnnotationKit.
  • macOS Catalina 10.15.3, Security Update 2020-001 Mojave, Security Update 2020-001 High Sierra for macOS High Sierra 10.13.6, macOS Mojave 10.14.6, and macOS Catalina 10.15.2. This update addresses thirty-two vulnerabilities; in addition to many described above, these include multiple issues in apache_mod_php, a gatekeeper bypass issue in autofs, arbitrary code execution vulnerabilities and an out-of-bounds read issue in CoreBluetooth, a validation issue in Crash Reporter, and more.
  • iCloud for Windows 10.9.2 for Windows 10 and later via the Microsoft Store. This update addresses seven vulnerabilities in ImageIO, libxml2, WebKit, and WebKit Page Loading, all of which are described above.

For more information about current and past patches and the vulnerabilities that they address, see the Apple Support website.

Adobe

Adobe released three update advisories this month, one fewer than in December. Two were released on their standard Patch Tuesday, Jan. 14. These include:

  • APSB20-03 Security update for Adobe Illustrator CC running on Windows. This update addresses five critical memory corruption vulnerabilities that can result in arbitrary code execution. It has a priority rating of 3.
  • APSB20-01 Security update for Adobe Experience Manager versions 6.0 through 6.5 running on all platforms. This update addresses four vulnerabilities, three of which are designated important and one moderate. They include two cross-site scripting issues, a user interface injection issue, and an expression language injection issue. All could lead to sensitive information disclosure. Priority rating is 2.

On Jan. 28, Adobe released an out-of-band update for its cloud commerce service, including the open-source edition:

  • APSB20-02 Security update for Magento. This update addresses six vulnerabilities, three of which are designated critical and three important. These include two stored cross-site scripting issues, deserialization of untrusted data, path traversal, security bypass, and a SQL injection issue. These can lead to sensitive information disclosure and arbitrary code execution, and the update has a priority rating of 2.

For more information, see the security bulletin summary.

Google

January non-Microsoft patches

On Jan. 16, Google released the latest stable channel version of the Chrome desktop web browser for Windows, Mac, and Linux. It includes eleven security fixes, including the following:

  • Critical CVE-2020-6378: Use-after-free in speech recognizer. Reported by Antti Levomäki and Christian Jalio from Forcepoint on 2019-10-28
  • High CVE-2020-6379: Use-after-free in speech recognizer. Reported by Guang Gong of Alpha Team, Qihoo 360 on 2019-12-12
  • High CVE-2020-6380: Extension message verification error. Reported by Sergei Glazunov of Google Project Zero on 2019-12-09
  • High CVE-2020-0601: Protections to mitigate Windows ECC certificate validation vulnerability CVE-2020-0601.

For more information, head over to Google’s blog.

Android

The monthly Android security bulletin was published on Jan. 6. The most severe issue addressed by these patches is a critical security vulnerability in Media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process. Vulnerabilities updated include CVEs in Framework, Media Framework, System, the kernel, and Qualcomm components. In addition to the one critical issue in Media Framework, there is a critical remote code execution vulnerability in the kernel components and multiple high severity issues including elevation of privilege and denial of service.

For more information about the vulnerabilities that are addressed by the Android updates, click here.

Oracle

Oracle normally releases security updates on a quarterly cycle, in January, April, July, and October. The most recent critical patch update occurred on Jan. 14. It contains 334 new security patches across the Oracle product families. Oracle customers can read more about the current patch release on the Oracle web site.

Mozilla

On Jan. 7, Mozilla released Firefox 72 with patches for the following vulnerabilities:

  • CVE-2019-17015: Memory corruption in parent process during new content process initialization on Windows (High severity). During the initialization of a new content process, a pointer offset can be manipulated leading to memory corruption and a potentially exploitable crash in the parent process. This issue only occurs on Windows. Other operating systems are unaffected.
  • CVE-2019-17016: Bypass of @namespace CSS sanitization during pasting (High severity). When pasting a <style> tag from the clipboard into a rich text editor, the CSS sanitizer incorrectly rewrites a @namespace rule. This could allow for injection into certain types of websites resulting in data exfiltration.
  • CVE-2019-17017: Type Confusion in XPCVariant.cpp (High severity). Due to a missing case handling object types, a type confusion vulnerability could occur, resulting in a crash. We presume that with enough effort that it could be exploited to run arbitrary code.
  • CVE-2019-17024: Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4 (High severity). Mozilla developers Jason Kratzer, Christian Holler, and Bob Clary reported memory safety bugs present in Firefox 71 and Firefox ESR 68.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
  • CVE-2019-17025: Memory safety bugs fixed in Firefox 72 (High severity). Mozilla developers Karl Tomlinson, Jason Kratzer, Tyson Smith, Jon Coppeard, and Christian Holler reported memory safety bugs present in Firefox 71. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
  • CVE-2019-17018: Windows Keyboard in Private Browsing Mode may retain word suggestions (Moderate severity). When in Private Browsing Mode on Windows 10, the Windows keyboard may retain word suggestions to improve the accuracy of the keyboard.
  • CVE-2019-17019: Python files could be inadvertently executed upon opening a download (Moderate severity). When Python was installed on Windows, a python file being served with the MIME type of text/plain could be executed by Python instead of being opened as a text file when the Open option was selected upon download. This issue only occurs on Windows. Other operating systems are unaffected.
  • CVE-2019-17020: Content Security Policy not applied to XSL stylesheets applied to XML documents (Moderate severity). If an XML file is served with a Content Security Policy and the XML file includes an XSL stylesheet, the Content Security Policy will not be applied to the contents of the XSL stylesheet. If the XSL sheet e.g. includes JavaScript, it would bypass any of the restrictions of the Content Security Policy applied to the XML document.
  • CVE-2019-17021: Heap address disclosure in parent process during content process initialization on Windows (Moderate severity). During the initialization of a new content process, a race condition occurs that can allow a content process to disclose heap addresses from the parent process. This issue only occurs on Windows. Other operating systems are unaffected.
  • CVE-2019-17022: CSS sanitization does not escape HTML tags (Moderate severity). When pasting a <style> tag from the clipboard into a rich text editor, the CSS sanitizer does not escape < and > characters. Because the resulting string is pasted directly into the text node of the element this does not result in a direct injection into the webpage; however, if a webpage subsequently copies the node’s innerHTML, assigning it to another innerHTML, this would result in an XSS vulnerability. Two WYSIWYG editors were identified with this behavior, more may exist.
  • CVE-2019-17023: NSS may negotiate TLS 1.2 or below after a TLS 1.3 HelloRetryRequest had been sent (Low severity). After a HelloRetryRequest has been sent, the client may negotiate a lower protocol that TLS 1.3, resulting in an invalid state transition in the TLS State Machine. If the client gets into this state, incoming Application Data records will be ignored.

For more information about these and other vulnerabilities patched by Mozilla, click here.

Linux

January non-Microsoft patches

Popular Linux distros, as usual, have seen a number of security advisories and updates this month. As of October 31, Ubuntu has issued the following fifty-five security advisories since last month’s roundup. Some of these advisories address a large number of vulnerabilities in one advisory. In some cases, there are multiple advisories for the same vulnerabilities. Other commercial Linux vendors issued a similar number of updates.

  • USN-4234-2: Firefox regressions. USN-4234-1 fixed vulnerabilities in Firefox. The update introduced various minor regressions. This update fixes the problems. We apologize for the inconvenience. Original advisory details: Multiple security issues were discovered in Firefox. If a user were tricked into opening a specially crafted website, an attacker could potentially…
  • USN-4262-1: OpenStack Keystone vulnerability. Daniel Preussker discovered that OpenStack Keystone incorrectly handled the list credentials API. A user with a role on the project could use this issue to view any other user’s credentials.
  • USN-4261-1: WebKitGTK+ vulnerabilities. A large number of security issues were discovered in the WebKitGTK+ Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution.
  • USN-4259-1: Apache Solr vulnerability. Michael Stepankin and Olga Barinova discovered that Apache Solr was vulnerable to an XXE attack. An attacker could use this vulnerability to remotely execute code.
  • USN-4254-2: Linux kernel (Xenial HWE) vulnerabilities. USN-4254-1 fixed vulnerabilities in the Linux kernel for Ubuntu 16.04 LTS. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu 14.04 ESM. It was discovered that the Linux kernel did not properly clear data structures on context switches for certain Intel graphics.
  • USN-4258-1: Linux kernel vulnerabilities. It was discovered that the Atheros 802.11ac wireless USB device driver in the Linux kernel did not properly validate device metadata. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2019-15099) It was discovered that a race condition existed in the Virtual Video Test Driver in the Linux kernel.
  • USN-4253-2: Linux kernel (HWE) vulnerability. USN-4253-1 fixed vulnerabilities in the Linux kernel for Ubuntu 19.10. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 19.10 for Ubuntu 18.04 LTS. It was discovered that the Linux kernel did not properly clear data structures on context switches for certain Intel graphics processors.
  • USN-4255-2: Linux kernel (HWE) vulnerabilities. USN-4255-1 fixed vulnerabilities in the Linux kernel for Ubuntu 18.04 LTS. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 18.04 LTS for Ubuntu 16.04 LTS. It was discovered that the Linux kernel did not properly clear data structures on context switches for certain Intel graphics.
  • USN-4257-1: OpenJDK vulnerabilities. It was discovered that OpenJDK incorrectly handled exceptions during deserialization in BeanContextSupport. An attacker could use this issue to cause a denial of service or other unspecified impact. (CVE-2020-2583) It was discovered that OpenJDK incorrectly validated properties of SASL messages included in Kerberos GSSAPI.
  • USN-4236-3: Libgcrypt vulnerability. USN-4236-1 fixed a vulnerability in Libgcrypt. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. Original advisory details: It was discovered that Libgcrypt was susceptible to a ECDSA timing attack. An attacker could use this attack to recover sensitive information.
  • USN-4256-1: Cyrus SASL vulnerability. It was discovered that Cyrus SASL incorrectly handled certain LDAP packets. An attacker could use this issue to execute arbitrary code or cause a denial of service.
  • USN-4255-1: Linux kernel vulnerabilities. It was discovered that the Linux kernel did not properly clear data structures on context switches for certain Intel graphics processors. A local attacker could use this to expose sensitive information. (CVE-2019-14615) It was discovered that a race condition can lead to a use-after-free while destroying GEM contexts in the i915 driver.
  • USN-4254-1: Linux kernel vulnerabilities. It was discovered that the Linux kernel did not properly clear data structures on context switches for certain Intel graphics processors. A local attacker could use this to expose sensitive information. (CVE-2019-14615) It was discovered that a race condition existed in the Virtual Video Test Driver in the Linux kernel.
  • USN-4253-1: Linux kernel vulnerability. It was discovered that the Linux kernel did not properly clear data structures on context switches for certain Intel graphics processors. A local attacker could use this to expose sensitive information.
  • USN-4252-2: tcpdump vulnerabilities. USN-4252-1 fixed several vulnerabilities in tcpdump. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. Original advisory details: Multiple security issues were discovered in tcpdump. A remote attacker could use these issues to cause tcpdump to crash, resulting in a denial of service, or possibly execute arbitrary code.
  • USN-4252-1: tcpdump vulnerabilities. Multiple security issues were discovered in tcpdump. A remote attacker could use these issues to cause tcpdump to crash, resulting in a denial of service, or possibly execute arbitrary code.
  • USN-4251-1: Tomcat vulnerabilities. It was discovered that Tomcat incorrectly handled the RMI registry when configured with the JMX Remote Lifecycle Listener. A local attacker could use this issue to obtain credentials and gain complete control over the Tomcat instance. (CVE-2019-12418) It was discovered that Tomcat incorrectly handled FORM authentication.
  • USN-4250-1: MySQL vulnerabilities. Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 8.0.19 in Ubuntu 19.10. Ubuntu 16.04 LTS and Ubuntu 18.04 LTS have been updated to MySQL 5.7.29.
  • USN-4230-2: ClamAV vulnerability. USN-4230-1 fixed a vulnerability in ClamAV. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. Original advisory details: It was discovered that ClamAV incorrectly handled certain MIME messages. A remote attacker could use this issue to cause ClamAV to crash, resulting in a denial of service.
  • USN-4233-2: GnuTLS update. USN-4233-1 disabled SHA1 being used for digital signature operations in GnuTLS. In certain network environments, certificates using SHA1 may still be in use. This update adds the %VERIFY_ALLOW_BROKEN and %VERIFY_ALLOW_SIGN_WITH_SHA1 priority strings that can be used to temporarily re-enable SHA1.
  • USN-4247-3: python-apt vulnerabilities. USN-4247-1 fixed several vulnerabilities in python-apt. This update provides the corresponding updates for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. Original advisory details: It was discovered that python-apt would still use MD5 hashes to validate certain downloaded packages.
  • USN-4249-1: e2fsprogs vulnerability. It was discovered that e2fsprogs incorrectly handled certain ext4 partitions. An attacker could use this issue to execute arbitrary code.
  • USN-4247-2: python-apt regression. USN-4247-1 fixed vulnerabilities in python-apt. The updated packages caused a regression when attempting to upgrade to a new Ubuntu release. This update fixes the problem.
  • USN-4246-1: zlib vulnerabilities. It was discovered that zlib incorrectly handled pointer arithmetic. An attacker could use this issue to cause zlib to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2016-9840, CVE-2016-9841) It was discovered that zlib incorrectly handled vectors involving left shifts of negative integers.
  • USN-4248-1: GraphicsMagick vulnerabilities. It was discovered that GraphicsMagick incorrectly handled certain image files. An attacker could use this issue to cause a denial of service or other unspecified impact.
  • USN-4247-1: python-apt vulnerabilities. It was discovered that python-apt would still use MD5 hashes to validate certain downloaded packages. If a remote attacker were able to perform a man-in-the-middle attack, this flaw could potentially be used to install altered packages.
  • USN-4245-1: PySAML2 vulnerability. It was discovered that PySAML2 incorrectly handled certain SAML files. An attacker could use this issue to bypass signature verification with arbitrary data.
  • USN-4244-1: Samba vulnerabilities. It was discovered that Samba did not automatically replicate ACLs set to inherit down a subtree on AD Directory, contrary to expectations. This issue was only addressed in Ubuntu 18.04 LTS, Ubuntu 19.04 and Ubuntu 19.10.
  • USN-4243-1: libbsd vulnerabilities. It was discovered that libbsd incorrectly handled certain inputs. An attacker could use this issue to execute arbitrary code. This issue only affected Ubuntu 14.04 ESM.
  • USN-4242-1: Sysstat vulnerabilities. It was discovered that Sysstat incorrectly handled certain inputs. An attacker could use this issue to cause a crash or execute arbitrary code. This issue only affected Ubuntu 19.04 and Ubuntu 19.10. (CVE-2019-16167) It was discovered that Sysstat incorrectly handled certain inputs. An attacker could use this issue to execute arbitrary code.
  • USN-4225-2: Linux kernel (HWE) vulnerabilities. USN-4225-1 fixed vulnerabilities in the Linux kernel for Ubuntu 19.10. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 19.10 for Ubuntu 18.04 LTS. It was discovered that a heap-based buffer overflow existed in the Marvell WiFi-Ex Driver for the Linux kernel.
  • USN-4241-1: Thunderbird vulnerabilities. Multiple security issues were discovered in Thunderbird. If a user were tricked into opening a specially crafted website in a browsing context, an attacker could potentially exploit these to cause a denial of service, conduct cross-site scripting (XSS) attacks, or execute arbitrary code.
  • USN-4240-1: Kamailio vulnerability. It was discovered that Kamailio can be exploited by using a specially crafted message that can cause a buffer overflow issue.
  • USN-4235-2: nginx vulnerability. USN-4235-1 fixed a vulnerability in nginx. This update provides the corresponding update for Ubuntu 14.04 ESM. Original advisory details: Bert JW Regeer and Francisco Oca Gonzalez discovered that nginx incorrectly handled certain error_page configurations. A remote attacker could use this issue to perform HTTP request smuggling.
  • USN-4221-2: libpcap vulnerability. USN-4221-1 fixed a vulnerability in libpcap. This update provides the corresponding update for Ubuntu 12.04 ESM. Original advisory details: It was discovered that libpcap did not properly validate PHB headers in some situations. An attacker could use this to cause a denial of service (memory exhaustion).
  • USN-4239-1: PHP vulnerabilities. It was discovered that PHP incorrectly handled certain files. An attacker could use this issue to cause a denial of service. This issue only affected Ubuntu 14.04 ESM, 16.04 LTS, 18.04 LTS, 19.04 and 19.10. (CVE-2019-11045) It was discovered that PHP incorrectly handled certain inputs.
  • USN-4237-2: SpamAssassin vulnerabilities. USN-4237-1 fixed several vulnerabilities in SpamAssassin. This update provides the corresponding update for Ubuntu 12.04 ESM and 14.04 ESM. Original advisory details: It was discovered that SpamAssassin incorrectly handled certain CF files.
  • USN-4238-1: SDL_image vulnerabilities. It was discovered that SDL_image incorrectly handled certain image files. An attacker could use this issue to cause a denial of service or other unspecified impact.
  • USN-4236-2: Libgcrypt vulnerability. USN-4236-1 fixed a vulnerability in Libgcrypt. This update provides the corresponding fix for Ubuntu 16.04 LTS. Original advisory details: It was discovered that Libgcrypt was susceptible to a ECDSA timing attack. An attacker could use this attack to recover sensitive information.
  • USN-4237-1: SpamAssassin vulnerabilities. It was discovered that SpamAssassin incorrectly handled certain CF files. If a user or automated system were tricked into using a specially-crafted CF file, a remote attacker could run arbitrary code. (CVE-2018-11805) It was discovered that SpamAssassin incorrectly handled certain messages.
  • USN-4236-1: Libgcrypt vulnerability. It was discovered that Libgcrypt was susceptible to a ECDSA timing attack. An attacker could use this attack to recover sensitive information.
  • USN-4235-1: nginx vulnerability. Bert JW Regeer and Francisco Oca Gonzalez discovered that nginx incorrectly handled certain error_page configurations. A remote attacker could use this issue to perform HTTP request smuggling attacks and access resources contrary to expectations.
  • USN-4047-2: libvirt update vulnerability. USN-4047-1 fixed a vulnerability in libvirt. This update provides the corresponding update for Ubuntu 14.04 ESM. Original advisory details: Matthias Gerstner and Ján Tomko discovered that libvirt incorrectly handled certain API calls. An attacker could use this issue to check for arbitrary files or execute arbitrary binaries.
  • USN-4234-1: Firefox vulnerabilities. Multiple security issues were discovered in Firefox. If a user were tricked into opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, bypass Content Security Policy (CSP) restrictions, conduct cross-site scripting (XSS) attacks, or execute arbitrary code.
  • USN-4229-1: NTP vulnerability. It was discovered that ntpq and ntpdc incorrectly handled some arguments. An attacker could use this issue to cause ntpq or ntpdc to crash, execute arbitrary code, or escalate to higher privileges.
  • USN-4233-1: GnuTLS update. As a security improvement, this update marks SHA1 as being untrusted for digital signature operations.
  • USN-4231-1: NSS vulnerability. It was discovered that NSS incorrectly handled certain inputs. An attacker could use this issue to execute arbitrary code.
  • USN-4232-1: GraphicsMagick vulnerabilities. It was discovered that GraphicsMagick incorrectly handled certain image files. An attacker could use this issue to cause a denial of service or other unspecified impact.
  • USN-4230-1: ClamAV vulnerability. It was discovered that ClamAV incorrectly handled certain MIME messages. A remote attacker could use this issue to cause ClamAV to crash, resulting in a denial of service.
  • USN-4227-2: Linux kernel (Azure) vulnerabilities. USN-4227-1 fixed vulnerabilities in the Linux kernel for Ubuntu 18.04 LTS. This update provides the corresponding updates for the Linux kernel for Microsoft Azure Cloud systems for Ubuntu 14.04 ESM. It was discovered that a heap-based buffer overflow existed in the Marvell WiFi-Ex Driver for the Linux kernel.
  • USN-4228-2: Linux kernel (Xenial HWE) vulnerabilities. USN-4228-1 fixed vulnerabilities in the Linux kernel for Ubuntu 16.04 LTS. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu 14.04 ESM. It was discovered that a heap-based buffer overflow existed in the Marvell WiFi-Ex Driver for the Linux kernel.
  • USN-4228-1: Linux kernel vulnerabilities. It was discovered that a heap-based buffer overflow existed in the Marvell WiFi-Ex Driver for the Linux kernel. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.
  • USN-4227-1: Linux kernel vulnerabilities. It was discovered that a heap-based buffer overflow existed in the Marvell WiFi-Ex Driver for the Linux kernel. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.
  • USN-4226-1: Linux kernel vulnerabilities. Michael Hanselmann discovered that the CIFS implementation in the Linux kernel did not sanitize paths returned by an SMB server. An attacker controlling an SMB server could use this to overwrite arbitrary files.
  • USN-4225-1: Linux kernel vulnerabilities. It was discovered that a heap-based buffer overflow existed in the Marvell WiFi-Ex Driver for the Linux kernel. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.

Featured image: Shutterstock / TechGenix photo illustration

About The Author

Leave a Comment

Your email address will not be published. Required fields are marked *

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scroll to Top